Cache Bypassing and Checkpointing to Circumvent Data Security Attacks on STTRAM.
Nitin RathiAsmit DeHelia NaeimiSwaroop GhoshPublished in: CoRR (2016)
Keyphrases
- data security
- distributed databases
- data integrity
- access control
- data management
- data centric
- information security
- data access
- query processing
- distributed database systems
- data privacy
- main memory
- distributed systems
- third party
- management system
- data warehousing
- data storage
- data sharing
- active databases
- data driven